Uncovering Large Scale Fraud Operations
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore advanced fraud techniques and countermeasures in this 40-minute RSA Conference talk. Delve into how adversaries exploit digital transformation to automate credential theft and account takeovers on an unprecedented scale. Learn about sophisticated attack tactics, including fishing, SSL certificate manipulation, and session randomization. Discover new delivery methods and anti-research techniques employed by cybercriminals. Examine real-world examples of Instagram phishing, mobile emulator exploitation, and device fingerprint spoofing. Understand the role of artificial intelligence in modern phishing attacks. Gain valuable insights on protecting against these evolving threats and implementing effective security measures to safeguard digital assets and user accounts.
Syllabus
Introduction
Agenda
Digital Transformation
New Targets
Attack Tactics
Fishing
SSL Certificates
Session Randomization Folders
New Delivery Methods
AntiResearch Techniques
Session Protection Techniques
Blocked AP List
Reverse Proxy Phishing
Instagram Phishing
What is Mobile Emulator
Device Fingerprint Spoofing
Example
Network Connection
Scripts
Second Factor Authentication
Transfer of Funds
Artificial Intelligence
Phishing
What you need to do
Thank you
Taught by
RSA Conference
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Privacy and Security in Online Social Media
Indian Institute of Technology Delhi via Swayam The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy Offensive Security Engineering
Udemy Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn